General

  • Target

    0c76966d7c1bed935c4d8bb9adb0828ec1491f6a5e1e52ed11d7bf716bc259db.bin

  • Size

    760KB

  • Sample

    250331-162brayyex

  • MD5

    098e51ac2aa66bfb619c4b1d0ae1a928

  • SHA1

    020fd3f4c33e7b73bae6106da91924aa4f19c325

  • SHA256

    0c76966d7c1bed935c4d8bb9adb0828ec1491f6a5e1e52ed11d7bf716bc259db

  • SHA512

    e0ce2bcb924f6dccdb90827cdb8ba5f6bda29f77db3881d2aa0f03284e42282edcebbd149c9dc19bbf69e3ecd5521c2e0761d90f7700a3f94402e54c92c18802

  • SSDEEP

    12288:YfmMa1a8LrezvTPv8om5WmpYshXZPbGwidNpgz7X:2a1a2ezDv8om5WmD9idNpE

Malware Config

Extracted

Family

spynote

C2

Gandoebmanda-32810.portmap.host:32810

Targets

    • Target

      0c76966d7c1bed935c4d8bb9adb0828ec1491f6a5e1e52ed11d7bf716bc259db.bin

    • Size

      760KB

    • MD5

      098e51ac2aa66bfb619c4b1d0ae1a928

    • SHA1

      020fd3f4c33e7b73bae6106da91924aa4f19c325

    • SHA256

      0c76966d7c1bed935c4d8bb9adb0828ec1491f6a5e1e52ed11d7bf716bc259db

    • SHA512

      e0ce2bcb924f6dccdb90827cdb8ba5f6bda29f77db3881d2aa0f03284e42282edcebbd149c9dc19bbf69e3ecd5521c2e0761d90f7700a3f94402e54c92c18802

    • SSDEEP

      12288:YfmMa1a8LrezvTPv8om5WmpYshXZPbGwidNpgz7X:2a1a2ezDv8om5WmD9idNpE

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks